gnark is a zero-knowledge proof system framework. In versions prior to 0.14.0, the Verify function in eddsa.go and ecdsa.go used the S value from a signature without asserting that 0 ≤ S < order, leading to a signature malleability vulnerability. Because gnark’s native EdDSA and ECDSA circuits lack essential constraints, multiple distinct witnesses can satisfy the same public inputs. In protocols where nullifiers or anti-replay checks are derived from R and S, this enables signature malleability and may allow double spending. This issue has been addressed in version 0.14.0.
CVSS
No CVSS.
References
Configurations
No configuration.
History
25 Aug 2025, 20:24
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
22 Aug 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-22 20:15
Updated : 2025-08-25 20:24
NVD link : CVE-2025-57801
Mitre link : CVE-2025-57801
CVE.ORG link : CVE-2025-57801
JSON object : View
Products Affected
No product.
CWE
CWE-347
Improper Verification of Cryptographic Signature